CVE-2021-31799
Published: 15 July 2021
In RDoc 3.11 through 6.x before 6.3.1, as distributed with Ruby through 3.0.1, it is possible to execute arbitrary code via | and tags in a filename.
Priority
Status
Package | Release | Status |
---|---|---|
ruby1.9.1 Launchpad, Ubuntu, Debian |
focal |
Does not exist
|
groovy |
Does not exist
|
|
hirsute |
Does not exist
|
|
impish |
Does not exist
|
|
jammy |
Does not exist
|
|
trusty |
Does not exist
|
|
upstream |
Needs triage
|
|
xenial |
Does not exist
|
|
bionic |
Does not exist
|
|
ruby2.0 Launchpad, Ubuntu, Debian |
bionic |
Does not exist
|
focal |
Does not exist
|
|
groovy |
Does not exist
|
|
hirsute |
Does not exist
|
|
impish |
Does not exist
|
|
jammy |
Does not exist
|
|
trusty |
Does not exist
|
|
upstream |
Needs triage
|
|
xenial |
Does not exist
|
|
ruby2.3 Launchpad, Ubuntu, Debian |
bionic |
Does not exist
|
focal |
Does not exist
|
|
groovy |
Does not exist
|
|
hirsute |
Does not exist
|
|
impish |
Does not exist
|
|
jammy |
Does not exist
|
|
trusty |
Does not exist
|
|
upstream |
Needs triage
|
|
xenial |
Released
(2.3.1-2~ubuntu16.04.16+esm1)
Available with Ubuntu Pro or Ubuntu Pro (Infra-only) |
|
ruby2.5 Launchpad, Ubuntu, Debian |
focal |
Does not exist
|
groovy |
Does not exist
|
|
hirsute |
Does not exist
|
|
impish |
Does not exist
|
|
jammy |
Does not exist
|
|
trusty |
Does not exist
|
|
upstream |
Needs triage
|
|
xenial |
Does not exist
|
|
bionic |
Released
(2.5.1-1ubuntu1.10)
|
|
ruby2.7 Launchpad, Ubuntu, Debian |
bionic |
Does not exist
|
impish |
Released
(2.7.4-1ubuntu1)
|
|
trusty |
Does not exist
|
|
upstream |
Needs triage
|
|
xenial |
Does not exist
|
|
focal |
Released
(2.7.0-5ubuntu1.5)
|
|
groovy |
Released
(2.7.1-3ubuntu1.4)
|
|
hirsute |
Released
(2.7.2-4ubuntu1.2)
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.0 |
Attack vector | Local |
Attack complexity | High |
Privileges required | Low |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H |
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31799
- https://www.ruby-lang.org/en/news/2021/05/02/os-command-injection-in-rdoc/
- https://github.com/ruby/ruby/commit/b1c73f239fe9af97de837331849f55d67c27561e (master)
- https://github.com/ruby/ruby/commit/483f303d02e768b69e476e0b9be4ab2f26389522 (2.7)
- https://ubuntu.com/security/notices/USN-5020-1
- NVD
- Launchpad
- Debian